|
Security operations require a strategy because different processes need to collaborate and build upon each other to be effective. Read this Executive Brief to understand...
|
|
|
Use this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users.
|
|
|
The Cloud Security CAGI Tool follows a custom framework in which an organization's cloud risk profile is analyzed to produce unique recommendations.
|
|
|
This phase of the blueprint, Build Your Security Operations From the Ground Up, will help you determine how to establish the foundation of your security operations.
|
|
|
This phase of the blueprint, Improve Security Governance with a Security Steering Committee, will help you define your committee.
|
|
|
Use this collection of workbooks to create a vendor security assessment for low, medium, and high-risk vendors.
|
|
|
This storyboard will help you define and plan your journey to implementing a right-sized vendor security assessment process.
|
|
|
GDPR has critical operational impacts and ramifications on organizations globally.
|
|
|
This Excel database maintains an inventory of all known vendors and the results of their last known security assessments.
|
|
|
Read this Executive Brief to understand why a security steering committee is different than an IT steering committee but just as valuable.
|
|